Issue metadata
Sign in to add a comment
|
CrOS: Vulnerability reported in net-misc/curl |
||||||||||||||||||||
Issue descriptionAutomated analysis has detected that the following third party packages have had vulnerabilities publicly reported. NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package. Package Name: net-misc/curl Package Version: [cpe:/a:curl:curl:7.51.0 cpe:/a:curl:libcurl:7.51.0 cpe:/a:haxx:curl:7.51.0 cpe:/a:haxx:libcurl:7.51.0] Advisory: CVE-2017-1000257 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-1000257 CVSS severity score: 6.4/10.0 Confidence: high Description: An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
,
Nov 30 2017
,
Nov 30 2017
Here is the upstream patch: https://github.com/curl/curl/commit/13c9a9ded3ae744a1e11cbc14e9146d9fa427040
,
Nov 30 2017
,
Nov 30 2017
the lakitu guys upgraded curl to 7.56.1 via b/68794751: https://chromium-review.googlesource.com/751700
,
Dec 1 2017
,
Mar 9 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by allenwebb@chromium.org
, Nov 30 2017Owner: allenwebb@chromium.org